Public Key Cryptography - PKC 2012: 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21 - 23, 2012 ; proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2012
|
Schriftenreihe: | Lecture notes in computer science
7293 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XIV, 734 S. graph. Darst. |
ISBN: | 3642300561 9783642300561 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040132517 | ||
003 | DE-604 | ||
005 | 20121107 | ||
007 | t| | ||
008 | 120514s2012 gw d||| |||| 10||| eng d | ||
015 | |a 12,N17 |2 dnb | ||
016 | 7 | |a 1021598607 |2 DE-101 | |
020 | |a 3642300561 |9 3-642-30056-1 | ||
020 | |a 9783642300561 |c Pb. : ca. EUR 93.09 (DE) (freier Pr.), ca. EUR 95.70 (AT) (freier Pr.), ca. sfr 116.00 (freier Pr.) |9 978-3-642-30056-1 | ||
024 | 3 | |a 9783642300561 | |
028 | 5 | 2 | |a Best.-Nr.: 86101117 |
035 | |a (OCoLC)796222370 | ||
035 | |a (DE-599)DNB1021598607 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-83 |a DE-91G | ||
082 | 0 | |a 005.82 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
111 | 2 | |a PKC |n 15 |d 2012 |c Darmstadt |j Verfasser |0 (DE-588)1022330705 |4 aut | |
245 | 1 | 0 | |a Public Key Cryptography - PKC 2012 |b 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21 - 23, 2012 ; proceedings |c Marc Fischlin ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2012 | |
300 | |a XIV, 734 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7293 | |
650 | 0 | 7 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Darmstadt |2 gnd-content | |
689 | 0 | 0 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Fischlin, Marc |d 1973- |e Sonstige |0 (DE-588)12359751X |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-30057-8 |
830 | 0 | |a Lecture notes in computer science |v 7293 |w (DE-604)BV000000607 |9 7293 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4012792&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024989644&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-024989644 |
Datensatz im Suchindex
_version_ | 1820875384065884160 |
---|---|
adam_text |
IMAGE 1
TABLE O F C O N T E N T S
HOMOMORPHIC ENCRYPTION AND LWE
BETTER BOOTSTRAPPING IN FULLY HOMOMORPHIC ENCRYPTION 1
CRAIG GENTRY, SHAI HALEVI, AND NIGEL P. SMART
POLLY CRACKER, REVISITED, REVISITED 17
GOTTFRIED HEROLD
RING-LWE IN POLYNOMIAL RINGS 34
LEO DUCAS AND ALAIN DURMUS
ON HOMOMORPHIC ENCRYPTION AND CHOSEN-CIPHERTEXT SECURITY 52
BRETT HEMENWAY AND RAFAIL OSTROVSKY
SIGNATURE SCHEMES
WATERS SIGNATURES WITH OPTIMAL SECURITY REDUCTION 66
DENNIS HOFHEINZ, TIBOR JAGER, AND EDWARD KNAPP
STRONG SECURITY FROM PROBABILISTIC SIGNATURE SCHEMES 84
SVEN SCHDGE
SPACE EFFICIENT SIGNATURE SCHEMES FROM THE RSA ASSUMPTION 102
SHOTA YAMADA, GOICHIRO HANAOKA, AND NOBORU KUNIHIRO
THE CONSTRUCTION OF AMBIGUOUS OPTIMISTIC FAIR EXCHANGE FROM DESIGNATED
CONFIRMER SIGNATURE WITHOUT RANDOM ORACLES 120
QIONG HUANG, DUNCAN S. WONG, AND WILLY SUSILO
C O D E - B A S E D AND MULTIVARIATE C R Y P T O
EFFICIENT IMPLEMENTATION OF A CCA2-SECURE VARIANT OF MCELIECE USING
GENERALIZED SRIVASTAVA CODES 138
PIERRE-LOUIS CAYREL, GERHARD HOFFMANN, AND EDOARDO PERSICHETTI
SOLVING UNDERDETERMINED SYSTEMS OF MULTIVARIATE QUADRATIC EQUATIONS
REVISITED 156
ENRICO THOMAE AND CHRISTOPHER WOLF
PUBLIC-KEY IDENTIFICATION SCHEMES BASED ON MULTIVARIATE CUBIC
POLYNOMIALS 172
KOICHI SAKUMOTO
HTTP://D-NB.INFO/1021598607
IMAGE 2
XII TABLE OF CONTENTS
PUBLIC-KEY CRYPTOGRAPHY FROM NEW MULTIVARIATE QUADRATIC ASSUMPTIONS 190
YUN-JU HUANG, FENG-HAO LIU, AND BO- YIN YANG
P U B L I C - K E Y ENCRYPTION: SPECIAL PROPERTIES
ANONYMOUS BROADCAST ENCRYPTION: ADAPTIVE SECURITY AND EFFICIENT
CONSTRUCTIONS IN THE STANDARD MODEL 206
BENOIT LIBERT, KENNETH G. PATERSON. AND ELIZABETH A. QUAGLIA
OUTSIDER-ANONYMOUS BROADCAST ENCRYPTION WITH SUBLINEAR CIPHERTEXTS 225
NELLY FAZIO AND IRIPPUGE MILINDA PERERA
VERIFIABLE PREDICATE ENCRYPTION AND APPLICATIONS T O CCA SECURITY AND
ANONYMOUS PREDICATE AUTHENTICATION 243
SHOTA YARAADA, NUTTAPONG ATTRAPADUNG, BAGUS SANTOSO, JACOB C.N, SCHULDT,
GOICHIRO HANAOKA, AND NOBORU KUNIHIRO
PUBLIC KEY ENCRYPTION AGAINST RELATED KEY ATTACKS 262
HOETECK WEE
IDENTITY-BASED ENCRYPTION
FUNCTIONAL ENCRYPTION FOR THRESHOLD FUNCTIONS (OR FUZZY IBE) FROM
LATTICES 280
SHWETA AGRAWAL, XAVIER BOYEN, VINOD VAIKUNTANATHAN, PANAGIOTIS
VOULGARIS, AND HOETECK WEE
VARIANTS OF WATERS' DUAL SYSTEM PRIMITIVES USING ASYMMETRIC PAIRINGS
(EXTENDED ABSTRACT) 298
SOMINDU C. RAMANNA, SANJIT CHATTERJEE, AND PALASH SARKAR
FROM SELECTIVE T O FULL SECURITY: SEMI-GENERIC TRANSFORMATIONS IN T H E
STANDARD MODEL 316
MICHEL ABDALLA, DARIO FIORE, AND VADIM LYUBASHEVSKY
CIRCULAR AND KDM SECURITY FOR IDENTITY-BASED ENCRYPTION 334
JACOB ALPERIN-SHERIFF AND CHRIS PEIKERT
P U B L I C - K E Y ENCRYPTION: CONSTRUCTIONS
NTRUCCA: HOW TO STRENGTHEN NTRUENCRYPT T O CHOSEN-CIPHERTEXT SECURITY IN
THE STANDARD MODEL 353
RON STEINFELD, SAN LING, JOSEF PIEPRZYK, CHNSTOPHE TARTARY. AND HUAXIONG
WANG
IMAGE 3
TABLE OF CONTENTS XIII
GENERATING PROVABLE PRIMES EFFICIENTLY ON EMBEDDED DEVICES 372
CHRISTOPHE CLAVIER, BENOIT FEIX, LOIC THIERRY, AND PASCAL PAILLIER
INVITED TALK
PASSWORD-BASED AUTHENTICATED KEY EXCHANGE 390
DAVID POINTCHEVAL
SECURE TWO-PARTY AND MULTI-PARTY COMPUTATIONS
CONSTANT-ROUND MULTI-PARTY PRIVATE SET UNION USING REVERSED LAURENT
SERIES 398
JAE HONG SEO, JUNG HEE CHEON, AND JONATHAN KATZ
POLICY-ENHANCED PRIVATE SET INTERSECTION: SHARING INFORMATION WHILE
ENFORCING PRIVACY POLICIES 413
EVNIL STEFANOV, ELAINE SHI. AND DAWN SONG
EFFICIENTLY SHUFFLING IN PUBLIC 431
UDAYA PARAMPALLI, K I M RAMCHEN, AND VANESSA TEAGUE
KEY EXCHANGE AND SECURE SESSIONS
EFFICIENT PASSWORD AUTHENTICATED KEY EXCHANGE VIA OBLIVIOUS TRANSFER 449
RAN CANETTI, DANA DACHMAN-SOLED, VINOD VAIKUNTANATHAN, AND HOETECK WEE
STRONGLY SECURE AUTHENTICATED KEY EXCHANGE FROM FACTORING, CODES, AND
LATTICES 467
ATSUSHI FUJIOKA, KOUTAROU SUZUKI, KEITA XAGAWA, AND KAZUKI YONEYAMA
RELATIVELY-SOUND NIZKS AND PASSWORD-BASED KEY-EXCHANGE 485
CHARANJIT JUTLA AND ARNAB ROY
MULTI-LOCATION LEAKAGE RESILIENT CRYPTOGRAPHY 504
ALI JUMA, YEVGENIY VAHLIS, AND MOTI YUNG
PUBLIC-KEY ENCRYPTION: RELATIONSHIPS
ON DEFINITIONS OF SELECTIVE OPENING SECURITY 522
FLORIAN BOHL, DENNIS HOFHEINZ, AND DANIEL KRASCHEWSKI
NEW DEFINITIONS AND SEPARATIONS FOR CIRCULAR SECURITY . . DAVID CASH,
MATTHEW GREEN, AND SUSAN HOHENBERGER 540
IMAGE 4
XIV TABLE OF CONTENTS
CORRELATED PRODUCT SECURITY FROM ANY ONE-WAY FUNCTION 558
BRETT HEMENWAY, STEVE LU, AND RAFAIL OSTROVSKY
RELATIONS BETWEEN CONSTRAINED AND BOUNDED CHOSEN CIPHERTEXT SECURITY FOR
KEY ENCAPSULATION MECHANISMS 576
TAKAHIRO MATSUDA, GOICHIRO HANAOKA, AND KANTA MATSUURA
DL, D D H , AND MORE N U M B E R THEORY
SOLVING A DISCRETE LOGARITHM PROBLEM WITH AUXILIARY INPUT ON A 160-BIT
ELLIPTIC CURVE 595
YUMI SAKEMI, GOICHIRO HANAOKA. TETSUYA IZU, MASAHIKO TAKENAKA, AND
MASAYA YASUDA
INFERRING SEQUENCES PRODUCED BY NONLINEAR PSEUDORANDOM NUMBER GENERATORS
USING COPPERSMITH'S METHODS 609
AURELIE BAUER, DAMIEN VERGNAUD, AND JEAN-CHRISTOPHE ZAPALOWICZ
EXTENDED-DDH AND LOSSY TRAPDOOR FUNCTIONS 627
BRETT HEMENWAY AND RAFAIL OSTROVSKY
DDH-LIKE ASSUMPTIONS BASED ON EXTENSION RINGS 644
RONALD CRAMER, IVAN DAMGDRD, EIKE KILTZ, SARAH ZAKARIAS, AND ANGELA
ZOTTAREL
B E Y O N D ORDINARY SIGNATURE SCHEMES
SECURITY OF BLIND SIGNATURES REVISITED 662
DOMINIQUE SCHRODER AND DOMINIQUE UNRUH
EFFICIENT NETWORK CODING SIGNATURES IN THE STANDARD MODEL 680
DARIO GATALANO, DARIO FIORE, AND BOG DAN WARINSCHI
IMPROVED SECURITY FOR LINEARLY HOMOMORPHIC SIGNATURES: A GENERIC
FRAMEWORK 697
DAVID MANDELL FREEMAN
ON THE SECURITY OF DYNAMIC GROUP SIGNATURES: PREVENTING SIGNATURE
HIJACKING 715
YUSUKE SAKAI, JACOB C.N. SCHULDT, KEITA EMURA, GOICHIRO HANAOKA, AND
KAZUO OHTA
A U T H O R I N D E X 733 |
any_adam_object | 1 |
author_GND | (DE-588)12359751X |
author_corporate | PKC Darmstadt |
author_corporate_role | aut |
author_facet | PKC Darmstadt |
author_sort | PKC Darmstadt |
building | Verbundindex |
bvnumber | BV040132517 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)796222370 (DE-599)DNB1021598607 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040132517</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20121107</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">120514s2012 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N17</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1021598607</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642300561</subfield><subfield code="9">3-642-30056-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642300561</subfield><subfield code="c">Pb. : ca. EUR 93.09 (DE) (freier Pr.), ca. EUR 95.70 (AT) (freier Pr.), ca. sfr 116.00 (freier Pr.)</subfield><subfield code="9">978-3-642-30056-1</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642300561</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86101117</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)796222370</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1021598607</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">PKC</subfield><subfield code="n">15</subfield><subfield code="d">2012</subfield><subfield code="c">Darmstadt</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1022330705</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Public Key Cryptography - PKC 2012</subfield><subfield code="b">15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21 - 23, 2012 ; proceedings</subfield><subfield code="c">Marc Fischlin ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 734 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7293</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Darmstadt</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fischlin, Marc</subfield><subfield code="d">1973-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)12359751X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-30057-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7293</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7293</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4012792&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024989644&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024989644</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Darmstadt gnd-content |
genre_facet | Konferenzschrift 2012 Darmstadt |
id | DE-604.BV040132517 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:14:47Z |
institution | BVB |
institution_GND | (DE-588)1022330705 |
isbn | 3642300561 9783642300561 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024989644 |
oclc_num | 796222370 |
open_access_boolean | |
owner | DE-706 DE-83 DE-91G DE-BY-TUM |
owner_facet | DE-706 DE-83 DE-91G DE-BY-TUM |
physical | XIV, 734 S. graph. Darst. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | PKC 15 2012 Darmstadt Verfasser (DE-588)1022330705 aut Public Key Cryptography - PKC 2012 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21 - 23, 2012 ; proceedings Marc Fischlin ... (eds.) Berlin [u.a.] Springer 2012 XIV, 734 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7293 Public-Key-Kryptosystem (DE-588)4209133-0 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2012 Darmstadt gnd-content Public-Key-Kryptosystem (DE-588)4209133-0 s DE-604 Fischlin, Marc 1973- Sonstige (DE-588)12359751X oth Erscheint auch als Online-Ausgabe 978-3-642-30057-8 Lecture notes in computer science 7293 (DE-604)BV000000607 7293 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4012792&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024989644&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Public Key Cryptography - PKC 2012 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21 - 23, 2012 ; proceedings Lecture notes in computer science Public-Key-Kryptosystem (DE-588)4209133-0 gnd |
subject_GND | (DE-588)4209133-0 (DE-588)1071861417 |
title | Public Key Cryptography - PKC 2012 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21 - 23, 2012 ; proceedings |
title_auth | Public Key Cryptography - PKC 2012 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21 - 23, 2012 ; proceedings |
title_exact_search | Public Key Cryptography - PKC 2012 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21 - 23, 2012 ; proceedings |
title_full | Public Key Cryptography - PKC 2012 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21 - 23, 2012 ; proceedings Marc Fischlin ... (eds.) |
title_fullStr | Public Key Cryptography - PKC 2012 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21 - 23, 2012 ; proceedings Marc Fischlin ... (eds.) |
title_full_unstemmed | Public Key Cryptography - PKC 2012 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21 - 23, 2012 ; proceedings Marc Fischlin ... (eds.) |
title_short | Public Key Cryptography - PKC 2012 |
title_sort | public key cryptography pkc 2012 15th international conference on practice and theory in public key cryptography darmstadt germany may 21 23 2012 proceedings |
title_sub | 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21 - 23, 2012 ; proceedings |
topic | Public-Key-Kryptosystem (DE-588)4209133-0 gnd |
topic_facet | Public-Key-Kryptosystem Konferenzschrift 2012 Darmstadt |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4012792&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024989644&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT pkcdarmstadt publickeycryptographypkc201215thinternationalconferenceonpracticeandtheoryinpublickeycryptographydarmstadtgermanymay21232012proceedings AT fischlinmarc publickeycryptographypkc201215thinternationalconferenceonpracticeandtheoryinpublickeycryptographydarmstadtgermanymay21232012proceedings |